Thirty years ago... - - PDF document

thirty years ago
SMART_READER_LITE
LIVE PREVIEW

Thirty years ago... - - PDF document

Thirty years ago...


slide-1
SLIDE 1
  • Thirty years ago...

(Okay, this was actually about 34 years ago...)

Fraction of Audience Catching Up On Email During Chair’s Welcome Talk 1980 2010

Advantage: 1980

  • Venue

1980

Oakland, CA

2010

Berkeley, CA

Advantage: 2010

Paper Acceptance Rate

1980 2010

Advantage: 2010

  • Paper Rejection Rate

Advantage: 1980

  • Arnold Schwarzenegger’s Occupation

1980 2010

Governor

Advantage: ?

Barbarian

slide-2
SLIDE 2

Bill Gates’ Occupation

1980 2010

Improving Global Health

Selling BASIC to IBM

Advantage

30th Anniversary Celebrations

1980 2010

None Gala Dinner Tonight! Winner 2010!

Program Overview

Program Committee

Giuseppe Ateniese · Michael Backes · Adam Barth Nikita Borisov · David Brumley · Cristian Cadar Shuo Chen · Anupam Datta · Nick Feamster Debin Gao · Jon Giffin · Virgil Gligor Michael Goodrich · J. Alex Halderman · Somesh Jha Rob Johnson · Engin Kirda · Yoshi Kohno Shriram Krishnamurthi · Christopher Kruegel Ruby Lee · Michael Locasto · Sergio Maffeis

  • Z. Morley Mao · Jonathan McCune · David Molnar

Cristina Nita-Rotaru · Vern Paxson · Mike Reiter Andrei Sabelfeld · Stuart Schechter · Hovav Shacham Vitaly Shmatikov · Radu Sion · Sean Smith Adam Smith · Dawn Song · Angelos Stavrou · Ed Suh Patrick Traynor · V. N. Venkatakrishnan · Dan Wallach Brent Waters · Westley Weimer · XiaoFeng Wang Felix Wu · Dongyan Xu · Haifeng Yu · Sencun Zhu

Research Papers

26 papers selected from 237 submissions Rigorous review process (≥ 5 reviews / paper) Emphasis on novel research contributions Spanning breadth of security research Authors from: 10 different countries 27 different university campuses 6 different companies/institutes

Systematization Papers: New for 2010

Systematization of Knowledge: “work that evaluates, systematizes, and contextualizes existing knowledge.” 5 papers selected from 30 submissions Same rigorous review process as research papers Emphasis on value to community Two sessions tomorrow: intrusion detection, taint analysis, vulnerability testing, CAPTCHAs, bootstrapping trust

slide-3
SLIDE 3

Other Program Elements

Short Talks (Chair: Angelos Stavrou) Tomorrow 4:30pm Poster Session and Reception (Carrie Gates and Terry Benzel) Tomorrow 5:45-7:30pm US Cybersecurity R & D (NSF, DHS, etc.) Wednesday, 1:30-5pm Workshops – Thursday (separate registration required)

Systematic Approaches to Digital Forensic Engineering W2SP 2010: Web 2.0 Security & Privacy

Break Break Break Break Break Break

Today

8:30 9:00 10:00 11:00 noon 1:00 2:00 3:00 4:00 5:00 Evening

Gala Dinner

Poster Session

Session 1: Malware Analysis Session 2: Information Flow Session 3: Root of Trust Session 4: Information Abuse Opening Session 5: Network Security Session 6: SoK 1 Lunch Business Meeting Session 7: Secure Systems 9:00 Lunch Session 8: SoK 2 Short Talks Session 9: Systems Session 9: Analyzing Deployed Systems Session 10: Language- Based Security Closing US Cybersecurity R&D (Open to all attendees)

Tues Weds Thursday: Workshops

9:00

Enjoy the Symposium!

Session 1 (right now!) Malware Analysis Chair: Jon Giffin, Georgia Tech